Signatures
Nocturne uses a variant of Schnorr signatures over Baby Jubjub. The secret key is derived from the spending key sk, and the public key is the spending public key PK.
Spelled out, signing takes as input a message hash m and proceeds as follows:
h←SHA512(sk)
s←h[0:32](derive the signing secret key from the spending key)
x←h[32:64](extract 32 bytes of entropy from the spending key)
v←randomBytes(32) (sample another 32 random bytes)
n←SHA512(x ∣∣ v ∣∣ m)modr∈Fr ("reduce" hash output into Fr, using extra entropy from sk addition to the rng)
R←n×G (the rest is a "standard" Schnorr signature)
c←H(PK.X ∣∣ R.X ∣∣ R.Y ∣∣ m)
z←n−sk⋅c
The signature is the pair (c,z)
To verify, we take as input the message m and signature (c,z) and do the following (this is the standard verification procedure):
Z←z×G
P←c×PK
R←Z+P
cp←H(PK.X ∣∣ R.X ∣∣ R.Y ∣∣ m)
Accept the signature if cp=c. Reject it otherwise.
Security Requirements
The signature scheme must be strongly unforgeable under chosen-message-attack (SUF-CMA).
Security Argument
Schnorr signature schemes are known to be secure under the discrete log assumption and the random-oracle model. In our case, it's secure based on the following assumptions:
Poseidon is a random oracle
The discrete log problem is infeasible in Baby Jubjub
Last updated